This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc., and you are auditing the data migration process from a legacy human resources (HR) system to a cloud-based system. Which of the following is the most significant security risk associated with this data migration?